Now showing items 31-40 of 40
New Branches, Old Roots: A Study of Methods and Techniques in Web/Hypermedia Systems Design
(Auerbach Publishers Inc., 2006)
Being Agile When It Really Matters: How ICT can Facilitate Rapid Response to Cardiac Emergencies
Sudden cardiac death is a serious public health issue in Ireland, especially within rural communities that cannot be quickly reached by emergency ambulance services. When a person suffers a cardiac ...
Web-Based Information Systems Development: An Empirical Study of Requirements Engineering Approaches
No system is perfect in so far as requirements are always the subject of ongoing negotiation, and there will generally be a subset of the requirements that get pushed aside. This is especially true of the volatile environments ...
The Paradox of "Structured" Methods for Software Requirements Management: A Case Study of an E-Government Development Project
This paper outlines the alternative perspectives of "rationalism" and "improvisation" within information systems development, and describes the major shortcomings of each. It then discusses how these shortcomings ...
Using Web-based Surveys for Information Systems Research: An Experience Report.
There has been much interest of late in the use of Web-based surveys. However, the methodological issues of Web-based surveys are poorly understood. This paper reports on the experiences gained from a recently conducted ...
Contextualising the insider threat: a mixed method study
(AIS Electronic Library (AISeL), 2016-12-10)
The insider threat is potentially the most damaging and costly threat to organisations, and while there is a considerable body of literature aimed at understanding this phenomenon, we contend that the theories contained ...
The insider threat - understanding the aberrant thinking of the rogue" Trusted Agent"
(AIS Electronic Library (AISeL), 2015-05-29)
A deficiency exists in the Information Systems Security literature because of the paucity of research aimed at understanding the mind of the insider criminal . Much of the academic and popular press focuses on external ...
Cloud security consciousness: a need for realisation in entrepreneurial small firms
(AIS Electronic Library (AISeL), 2014-04-09)
Cloud computing represents a fundamental shift in the way information services are provided but with its unique architecture comes additional security challenges, many of which are technical in nature. However, the ...
Linking threat avoidance and security adoption: a theoretical model For SMEs
(AIS Electronic Library (AISeL), 2015-06-07)
A deficiency exists in the Information Systems Security literature because of the tendency to regard IT threat avoidance and IT security adoption as separate behaviours. In addressing the deficiency this research in progress ...